Quantcast
Channel: Symantec Connect - Security Response - Billets
Browsing all 778 articles
Browse latest View live

Watch out for scams surrounding news of stolen celebrity nude photos

Scammers look to capitalize on narrative of an iCloud breach and public interest in additional stolen photos and videos.Read more...

View Article


Fresh phish served with a helping of AES

Attempts to use encryption to make analysis of phishing websites more difficult may be a sign of things to come.Read more...

View Article


Apple IDs targeted by Kelihos botnet phishing campaign

Botnet targets Apple customers, launching phishing email campaign to lure victims into disclosing their Apple IDs and passwords.Read more...

View Article

Significant security challenge for new vehicle communication standard

While V2V communications will enable a range of safety applications, securing the protocol will require a system of unprecedented complexity.Read more...

View Article

Microsoft Patch Tuesday – September 2014

This month the vendor is releasing four bulletins covering a total of 42 vulnerabilities. Thirty-six of this month's issues are rated Critical. This month the vendor is releasing four bulletins...

View Article


New iPhone could herald change to payments security landscape

The arrival of Apple Pay could help improve point-of-sale security but attackers are also likely to severely test the security of the new technology.Read more...

View Article

Snifula banking Trojan battles local Japanese security product

Snifula variant blocks image on bank’s website advising users to install PhishWall security software.Read more...

View Article

Life on Mars: How attackers took advantage of hope for alien existance in new...

Attackers sent fake NASA emails containing “proof” of alien life on Mars to spread Backdoor.Darkmoon.Read more...

View Article


How to secure your new iPhone in three simple steps

Symantec recommends best practices to keep your Apple ID account and iPhone safe.Read more...

View Article


ShellShock: All you need to know about the Bash Bug vulnerability

Web servers at risk as new vulnerability potentially affects most versions of Linux and Unix, as well as Mac OS X.Read more...

View Article

Australians increasingly hit by global tide of cryptomalware

Australia hit with a 1,300 percent increase of cryptomalware in global surge of cybercriminal activity.Read more...

View Article

Hacked Snapchat accounts use native chat feature to spread diet pill spam

Compromised Snapchat accounts have sent out photo messages of a box of Garcinia Cambogia, followed by a chat message with a suspicious link containing ‘groupon.com’ in the URL.Read more...

View Article

Sandworm Windows zero-day vulnerability being actively exploited in targeted...

Critical new Windows zero-day has reportedly been used in a limited number of targeted cyberespionage attacks to deliver a back door on to the victim’s computer.Read more...

View Article


Security vendors take action against Hidden Lynx malware

Cross-industry collaboration results in major blow against Hikit malware used by Hidden Lynx APT group.Read more...

View Article

Microsoft Windows TrueType Font parsing zero-day vulnerability used in...

A zero-day vulnerability affecting Microsoft Windows TrueType Font (TFF) parsing is reportedly being used to gain remote access into an international organization.Read more...

View Article


Microsoft Patch Tuesday – October 2014

This month the vendor is releasing eight bulletins covering a total of 24 vulnerabilities. Thirteen of this month's issues are rated ’Critical’. This month the vendor is releasing eight bulletins...

View Article

Poodle: Vulnerability in old version of SSL represents new threat

New vulnerability in SSL 3.0 can allow attackers to extract data from supposedly secure connections. New vulnerability in SSL 3.0 can allow attackers to extract data from supposedly secure...

View Article


Dropbox users targeted by phishing scam hosted on Dropbox

Fake Dropbox login page attempts to steal credentials for popular email services. Fake Dropbox login page attempts to steal credentials for popular email services.Read more...

View Article

PDF invoices may cost more than you expect

Misspelled invoice email claims to be looking for payment but steals confidential information instead. Misspelled invoice email claims to be looking for payment but steals confidential information...

View Article

Denial-of-service attacks—short but strong

DDoS amplification attacks continue to increase as attackers experiment with new protocols. DDoS amplification attacks continue to increase as attackers experiment with new protocols.Read more...

View Article
Browsing all 778 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>